To get immediate online assistance with network security issues, companies in Durham, NC, can find expert support from Progent's certified security professionals. Progent's online service staff is ready to offer effective and low-cost assistance with security emergencies that threaten the viability of your network. Progent's accredited consultants are qualified to support systems based on Microsoft Windows, Linux, macOS and OS X, Solaris, and major derivatives of UNIX. Progent's wide array of services encompasses firewall technology, email filtering and encryption, protected network architecture, and business continuity planning. Progent's support staff has earned the industry's most advanced security certifications including Certified Information Systems Auditor (CISA) and ISSAP.

Progent offers remote security support on a by-the-minute model with no minimum minutes and no extra fees for sign-up or after hours support. By billing by the minute and by delivering world-class help, Progent's pricing structure keeps costs under control and avoids situations where simple fixes result in big bills.

We've Been Attacked: What Can We Do?
If you are now faced with a network security crisis, visit Progent's Emergency Remote Network Support to find out how to receive fast help.

For businesses that have prepared carefully for being hacked, the step-by-step post-attack handling model outlined by GIAC is Progent's approved method of handling a major security incident.

Overview of Progent's Security Expertise
Managing computer protection plus staying ready for recovering critical information and functions following an attack demands a continual process involving a variety of technologies and procedures. Progent's certified security experts can support your organization at any level in your efforts to guard your IT network, from security assessments to designing a comprehensive security program. Important technologies covered by Progent's security engineers include Planning and Implementation, Information Recovery and Security Forensics, and Outsourced Filtering of E-mail-Based Attacks.

Designing and Building Protected Environments
Any company should have a thoroughly thought out security strategy that includes both proactive and responsive steps. The pre-attack plan is a collection of steps that helps to minimize vulnerabilities. The reactive strategy specifies activities to help security staff to evaluate the damage caused by a breach, repair the damage, document the experience, and revive network activity as soon as feasible. Progent can show you how to build protection into your business processes. Progent can set up scanning software, define and build a secure IT infrastructure, and propose procedures and policies that will optimize the protection of your network. Progent's security experts are available to help you to set up a firewall, design secure online and mobile access to e-mail and data, and configure an effective virtual private network (VPN).

If you are looking for an affordable option for jobbing out your network security management, Progent's 24x7 Monitoring Packages include continual online server monitoring and quick response to emergencies.

Hybrid Cloud Solutions
Progent can help your company you to design, implement, administer and troubleshoot enterprise hybrid cloud solutions that incorporate physical and cloud infrastructure and that are compliant with government data security standards. (Find out about Progent's Office 365 Exchange Online integration solutions with on-premises Exchange deployments, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)

Data Recovery and Failure Analysis
Progent provides expertise in recovering networks and computers that have been hacked, are suspect, or have stopped working following a security breakdown. Progent can show you how to evaluate the losses caused by the assault, return your company to normal business operations, and retrieve data lost owing to the attack. Progent's certified engineers can also oversee a thorough forensic analysis by going over event logs and using other proven forensics techniques. Progent's experience with security consulting reduces your downtime and permits Progent to suggest efficient strategies to prevent or mitigate future attacks.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior machine learning tools to guard endpoint devices and servers and VMs against new malware assaults such as ransomware and email phishing, which routinely evade traditional signature-matching AV tools. ProSight ASM protects on-premises and cloud-based resources and provides a unified platform to address the complete malware attack lifecycle including protection, detection, containment, remediation, and post-attack forensics. Top features include one-click rollback with Windows VSS and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection services offer ultra-affordable in-depth protection for physical servers and VMs, workstations, mobile devices, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alerts, device control, and web filtering through leading-edge tools incorporated within a single agent accessible from a unified console. Progent's security and virtualization consultants can help you to plan and configure a ProSight ESP deployment that meets your company's specific requirements and that helps you prove compliance with government and industry data protection regulations. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that require urgent attention. Progent can also assist you to install and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized businesses an affordable end-to-end service for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates your backup activities and allows rapid restoration of critical files, apps and virtual machines that have become lost or damaged as a result of hardware failures, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup specialists can provide world-class expertise to set up ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to recover your critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading data security companies to deliver web-based control and world-class protection for all your email traffic. The powerful architecture of Email Guard combines a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further layer of analysis for incoming email. For outgoing email, the local gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system software, and the applications. Because the system is virtualized, it can be moved easily to a different hosting environment without requiring a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and protect information related to your network infrastructure, procedures, business apps, and services. You can instantly find passwords or IP addresses and be warned automatically about impending expirations of SSLs ,domains or warranties. By updating and organizing your IT documentation, you can eliminate as much as half of time spent searching for critical information about your network. ProSight IT Asset Management features a common location for storing and collaborating on all documents required for managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re making enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you require when you need it. Find out more about Progent's ProSight IT Asset Management service.

Specialized Security Services Offered by Progent
Progent's security consultants offer unique expertise in vital facets of network protection including:

Information Risk Evaluation and Compliance Assessment
Progent offers expertise with security auditing software like Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a variety of comprehensive network scans to reveal potential security problems. Progent has extensive skills with these and similar utilities and can assist your company to analyze assessment reports and respond efficiently. Progent's security consultants also can perform web application testing and can conduct expert assessments of corporate-wide security to assess your organization's compliance with major global security standards including FISMA, NIST, and ISO 17799. Also, Progent can assess the strength of your wireless security covering stationary wireless appliances plus mobile devices. Get more details concerning Progent's Vulnerability Evaluation and Compliance Assessment.

Cisco Network Security, PIX and ASA Firewall, VPN, Aironet and Meraki Wireless Support
Progent's Cisco Certified Internetwork Experts and Cisco CCNP experts can deliver in-depth technical expertise for Cisco's entire range of security and VPN products including PIX 500 Series Firewalls and ASA 5500 Firewalls, the Catalyst Firewall Services Module (FWSM), secure broadband and IS routers, Aironet wireless access points, Meraki cloud-managed access points, and Catalyst switches. Read additional information concerning Cisco Protection, Virtual Private Network (VPN) and Aironet Wireless Expertise.

Other Firewall and VPN Consulting Services
As well as supporting a wide range of network security solutions available from Microsoft and Cisco, Progent can provide organizations of all sizes expert consulting for technologies from other important firewall and Virtual Private Network (VPN) vendors. Progent's consultants can provide:

Stealth Intrusion Checking Consulting
Stealth intrusion checking is a key method for allowing businesses to determine how vulnerable their networks are to real-world threats by showing how well corporate security procedures and mechanisms hold up against planned but unannounced penetration efforts launched by seasoned security specialists using advanced hacking methods. Find out the details concerning Progent's Penetration Testing Services.

CISM Security Support Expertise
Certified Information Security Manager Engineers for Durham, North CarolinaCertified Information Security Manager defines the basic competencies and international benchmarks of performance that computer security professionals are required to achieve. It provides executive management the confidence that consultants who have been awarded their certification have the experience and skill to offer efficient security administration and consulting services. Progent can offer a CISM-certified expert to assist your enterprise in vital security areas including information protection governance, vulnerability management, information security process management, and crisis response support.

Read additional details concerning Progent's Certified Information Security Manager Security Support Expertise.

CISSP Security Support Expertise
CISSP Qualified Network Security Specialists for Durham, North CarolinaProgent's CISSP experts are security specialists who have earned CISSP status as a result of demonstrated experience, extensive study, and exhaustive examination. CISSP qualification indicates mastery of an international standard for information security. American National Standards Institute has granted the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security management practices, security design and models, access control systems, software development security, operations security, physical security, cryptography, telecommunications, Internet security, and business continuity planning.

Find out the details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.

ISSAP-Qualified Consultants for Secure System Infrastructure
ISSAP Information Systems Security Architecture Professionals (ISSAP) for Durham, North CarolinaProgent's ISSAP qualified security consultants are consultants who have earned ISSAP status following rigorous testing and significant hands-on work with information security architecture. ISSAP security experts have in-depth understanding of access management mechanisms and methodologies, phone system and network protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-qualified security specialists can assist your business with all phases of secure network architecture.

Get more information about Progent's ISSAP Certified Secure Network Infrastructure Consulting Services.

CISA Consulting Services
Certified Information Systems Auditor (CISA) Engineers for Durham, North CarolinaThe CISA credential is an important qualification that indicates expertise in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass a comprehensive examination overseen by the ISACA professional association. Progent can provide the expertise of a CISA-certified security audit professional trained to assist businesses in the fields of information systems audit services, information technology enforcement, network assets and infrastructure lifecycle, information technology service delivery, safeguarding information assets, and business continuity preparedness.

Read more details about Progent's Certified Information Systems Auditor Professional Services.

CRISC Network Risk Mitigation Experts
CRISC Network Risk Engineers for Durham, North CarolinaThe CRISC certification program was established by ISACA in 2010 to verify an IT professional's ability to plan, deploy, and maintain IS control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to develop and carry out a business continuity or disaster recovery plan that follows leading practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and IT budget. Progent's network risk management services are complementary to the services available from Progent's CISA-certified security engineers for objectively auditing your IS management mechanisms and also with the services of Progent's CISM consultants for implementing company-wide security policies.

Read more details about Progent's CRISC-certified Risk Mitigation Services.

Global Information Assurance Certification Consulting Expertise
Security Experts with Global Information Assurance Certification for Durham, North CarolinaGIAC was founded in 1999 to validate the skill of network security experts. GIAC's mission is to ensure that an accredited security consultant possesses the knowledge needed to deliver services in key areas of network, information, and application software security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent offers the help of certified consultants for all of the network security services covered within GIAC certification programs such as auditing security systems, security incident response, traffic analysis, web application security, and SIEM solutions.

Learn more details concerning Progent's GIAC Information Assurance Support.

Depend on Progent for Computer Security Consulting Services
If your organization is located in Durham or anywhere in North Carolina and you're looking for security support services, call Progent at 800-993-9400 or see Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.